New & Notable
Web security tools and best practices News
August 20, 2021
API security is under scrutiny as businesses digitally transform, and startup vendors are emerging with fresh approaches for secure cloud computing.
May 22, 2019
Google disclosed two separate incidents in which G Suite passwords were stored insecurely, and in one of those incidents, the passwords were stored improperly for 14 years.
June 08, 2018
Amazon Web Services and Google Groups have seen data exposures due to poor configurations by users. Now, some have accidentally shared passwords on Trello boards.
January 22, 2016
The security researcher behind the LostPass phishing attack on LastPass has criticized the company's reaction and responses to his findings.
Web security tools and best practices Get Started
Bring yourself up to speed with our introductory content
A Uniform Resource Identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet. A URI distinguishes one resource from another. Continue Reading
Amazon Trust Services is a certificate authority created and operated by Amazon Web Services. Continue Reading
The Tor (the onion routing) browser is a web browser designed for anonymous web surfing and protection against traffic analysis. Continue Reading
Evaluate Web security tools and best practices Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
'Cloud native' has described applications and services for years, but its place in security is less clear. Get insight into cloud-native security from expert Dave Shackleford. Continue Reading
Blockchain and smart contracts have their own unique vulnerabilities. But poor code testing, cryptographic keys and generic network attacks will get you, too. Continue Reading
A Web application (Web app) is an application program that is stored on a remote server and delivered over the Internet through a browser interface. Continue Reading
Manage Web security tools and best practices
Learn to apply best practices and optimize your operations.
API security often feels complicated. However, your IT team will go a long way in securing its services if it avoids these common pitfalls in API design and implementation. Continue Reading
Google Chrome extensions can improve user experience, but they could access a lot of user data. Admins should take control over users' extensions for security and privacy reasons. Continue Reading
Are you ready for serverless security? Learn about four critical planning considerations software teams need to focus on if they plan to adopt serverless. Continue Reading
Problem Solve Web security tools and best practices Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
IT can fight browser-based attacks by separating browsers from the OS itself. Get to know tools such as Citrix Secure Browser Service and Windows Defender Application Guard. Continue Reading
Is it possible to build software speedily but safely? Startup CEO Mark Curphey thinks so, and he's using big data analytics to make open source code safe for developers everywhere. Continue Reading
Cloud-based application security is becoming an increasingly prevalent concern. Uncover three key best practices for preventing security breaches. Continue Reading